https://github.com/ndr-repo/otx2subdomains
Passive subdomain discovery through LevelBlue OTX.
https://github.com/ndr-repo/otx2subdomains
asset-discovery bug-bounty cyber-threat-intelligence cybersecurity enumeration otx penetration-testing powershell
Last synced: about 2 months ago
JSON representation
Passive subdomain discovery through LevelBlue OTX.
- Host: GitHub
- URL: https://github.com/ndr-repo/otx2subdomains
- Owner: ndr-repo
- License: gpl-3.0
- Created: 2025-01-30T23:31:31.000Z (4 months ago)
- Default Branch: main
- Last Pushed: 2025-03-20T22:52:41.000Z (3 months ago)
- Last Synced: 2025-04-14T10:04:56.731Z (about 2 months ago)
- Topics: asset-discovery, bug-bounty, cyber-threat-intelligence, cybersecurity, enumeration, otx, penetration-testing, powershell
- Language: PowerShell
- Homepage:
- Size: 21.5 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# otx2subdomains - Passive subdomain discovery via LevelBlue OTX
## Disclaimer
- otx2subdomains is a passive asset discovery scanner. This means it does not interact with the target domain or its hosts while performing a scan.
- This is done via the free OTX API and validated using Google's public DoH (DNS over HTTPS) resolvers.
- If you decide to interact with a host following a scan, it is **your responsibility** to verify you have the proper jurisdiction.**I am not responsible for any legal or criminal proceedings filed against you for using this tool.**
## Getting Started
otx2subdomains is written for Windows and has a few dependencies from [GnuWin32](https://gnuwin32.sourceforge.net/).Luckily, I wrote a tool for installing everything you need. You can run these scripts [from source](https://github.com/ndr-repo/gnuwin32_Scan-Download/), or use the [compiled executable binary](https://github.com/ndr-repo/gnuwin32_Scan-Download/releases/tag/v1.0.0).
If you would like to download the dependencies ad-hoc, you'll need to install gawk from [here](https://gnuwin32.sourceforge.net/packages/gawk.htm) and grep from [here](https://gnuwin32.sourceforge.net/packages/grep.htm).
**Quickstart Steps**:
1. Download and run my compiled installer for grep, sed, & awk dependancies
2. Verify the tools are added to your [environment variables](https://www.howtogeek.com/787217/how-to-edit-environment-variables-on-windows-10-or-11/)
3. Clone the otx2subdomains repository
4. Run otx2subdomains. If you are having issues accessing the dependencies from your environment vars, verify they are set and reboot your machine.## Support
- If you find use from this, consider supporting my work on [Ko-fi](https://ko-fi.com/weekndr_sec).
- As of this release, I'm currently consulting full-time and get paid by the project, not by my time.